IoT systems and networks remain highly vulnerable to attacks, whether malicious or accidental. These attacks result in lost personal and corporate data, legal fines, loss of customer trust and loss of services – or they can also simply shut down critical infrastructure, from oil and gas pipelines to manufacturing to the financial system. Despite the obvious security concerns, manufacturers worldwide continue churning out unprotected, connected things based on networks that were not intended to handle the security, traffic or things suddenly tied together. What can be done?
Trusted Computing Group (TCG) and experts from around computing, including Infineon, Lenovo and Onboard Security, will offer a session to discuss and demonstrate real-world solutions and technologies, based on widely vetted and adopted standards, to secure IoT systems, networks and data. The session will address the role and implementation of a root of trust, secure software to support a root of trust and how we can embed trust and security into networks. Experts also will demonstrate examples of these technologies and talk about resources and tools to implement them. Attendees will learn not only strategies for IoT security but what to look for when specifying gear and architecting for the IoT.
Dennis Mattoon, Software Engineer – Microsoft
Steve Hanna, Senior Principal – Infineon Technologies
Lee Wilson, Product Development Engineer – OnBoard Security
Thorsten Stremlau, Director of Global Large Enterprise Segment Products and Strategy – Lennovo